Explore chapters and articles related to this topic
Privacy Preservation with Machine Learning
Published in Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath, IoT Security Paradigms and Applications, 2020
P. Bhuvaneswari, Nagender Kumar Suryadevara
The main weakness of WEP is its use of static encryption keys. An eavesdropper can collect a large enough sample of your transmission stream to derive the WEP encryption key, which allows them to decrypt everything being transmitted by you. WPA is more secure than WEP, and it uses an enhanced encryption protocol called TKIP (Temporal Key Integrity Protocol). WPA key generation includes the shared key and network’s name (or SSID) for each client. Keys are refreshed to secure from the WEP attackers. WPA2 [20] is a much better version of Wi-Fi secure protocol than WPA for the stronger security against attacks. WPA2 has stronger encryption and authentication mechanisms, AES and counter mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). WPA2 maintains TKIP for backward compatibility.
Attacks and Security Mechanisms
Published in Yan Zhang, Jun Zheng, Honglin Hu, Security in Wireless Mesh Networks, 2008
Anjum Naveed, Salil S. Kanhere, Sanjay K. Jha
The second method is the Counter mode (CTR) with CBC-MAC Protocol (CCMP). CCMP is based on the Counter mode with CBC-MAC (CCM) [37] of the AES encryption algorithm. CCM combines Counter (CTR) for confidentiality and the Cipher Block Chaining (CBC) Message Authentication Code (MAC) for origin authentication and integrity. As shown in Figure 3.11, CCM encryption takes four inputs: the encryption key, Additional Authentication Data (AAD), a unique Nonce for every frame, and the plaintext. CCM requires a fresh TK (generated from PTK) for every session which is used as the encryption key. AAD is constructed from the MAC header, and consists of the following fields: Frame Control field FC (certain bits masked), Address A1, Address A2, Address A3, Sequence Control field SC (certain bits masked), Address A4 (if present in the MAC header), and quality-of-service Control field QC (if present). CCMP uses the A2 and the priority fields of the MAC header along with a 48-bit packet number (PN) to generate the unique nonce value for each frame protected by a given TK. PN is incremented for each MPDU, resulting in a fresh value of nonce for each MPDU. The output of the encryption is the cipher text and the MIC. The frame to be transmitted is constructed by concatenating the MPDU header, CCMP header, cipher text, and MIC. CCM encryption is explained in RFC 3610.
A 40-nm low-power WiFi SoC with clock gating and power management strategy
Published in International Journal of Electronics, 2023
Han Su, Jianbin Liu, Yanfeng Jiang
With the plentiful peripheral interfaces, the SoC can be applied to generic low power IoT loggers, video streaming from camera, OTT devices, WiFi-enabled speech recognition devices, smart power plugs, home automation, industrial wireless control, proximity and movement monitoring trigger devices and many other controllable devices around us. In terms of security aspect, cryptographic hardware accelerations like advanced encryption standard (AES) and random number generator (RNG), eFuse encryption and IEEE 802.11 standard security features including counter CBC-MAC protocol (CCMP) and wireless LAN authentication and privacy infrastructure (WPA/WPA2) are all supported on the proposed SoC. With the multiple features, the security of the chip can be ensured well. Meanwhile, with presented power management resolution, the power problem can be well settled.